This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.

Slides:



Advertisements
Similar presentations
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Advertisements

This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Everything your business needs to know but probably doesn’t.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Concepts of Database Management Seventh Edition
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Maintaining Windows Server 2008 File Services
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Processing Integrity and Availability Controls
November 2009 Network Disaster Recovery October 2014.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Security+ All-In-One Edition Chapter 16 – Disaster Recovery and Business Continuity Brian E. Brzezicki.
Chapter Sixteen Data Recovery and Fault Tolerance.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Disaster Recovery, Business Continuity, and Organizational Policies.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Lesson 20. Fault Tolerance and Disaster Recovery.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Concepts of Database Management Sixth Edition
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
CompTIA A+ Certification 801 Support Skills
Concepts of Database Management Eighth Edition
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
This courseware is copyrighted © 2013 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Disaster Recovery and Business Continuity Planning.
Backups CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
Security fundamentals Topic 11 Maintaining operational security.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Install, configure and test ICT Networks
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Database recovery contd…
CompTIA Security+ Study Guide (SY0-501)
Presentation transcript:

This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to accompany the courseware may be copied, photocopied, reproduced, or re-used in any form or by any means without permission in writing from a director of gtslearning International Limited. Violation of these laws will lead to prosecution. All trademarks, service marks, products, or services are trademarks or registered trademarks of their respective holders and are acknowledged by the publisher. All gtslearning products are supplied on the basis of a single copy of a course per student. Additional resources that may be made available from gtslearning may only be used in conjunction with courses sold by gtslearning. No material changes to these resources are permitted without express written permission by a director of gtslearning. These resources may not be used in conjunction with content from any other supplier. If you suspect that this course has been copied or distributed illegally, please telephone or gtslearning. CompTIA Server+ Certification 5.3 Disaster Recovery

Objectives Develop an effective Disaster Recovery Plan (DRP) Understand the importance of fault tolerance Identify the main components that require redundancy Understand the use and configuration of clusters Understand what to do in an emergency situation and the basics of fire prevention and suppression systems Understand recovery procedures and the use of replication methods to maintain hot, cold, and warm sites Describe data and security backup and archive strategies and technologies 5.3 Disaster RecoverySlide 2

Disaster Recovery Planning Identify scenarios for natural and non-natural disaster and options for protecting systems Make Business Impact Assessments (BIA) Identify tasks, resources, and responsibilities Train staff Test disaster recovery procedures – Drill or walkthrough – Disaster recovery exercises Timescales 5.3 Disaster RecoverySlide 3

Fault Tolerance Redundant components Hot swappable components Uninterruptible Power Supplies (UPS) and backup generators Backup strategies Anti-virus software 5.3 Disaster RecoverySlide 4

Eliminating Single Points of Failure Power Supply Network Card Processors Cooling Fans Hard Disks 5.3 Disaster RecoverySlide 5

Clusters 5.3 Disaster RecoverySlide 6

Health and Safety Identify what to do in an emergency Identify responsible persons Identify hazardous areas in the workspace Describe best practice for use and care of the workspace and equipment within it Establish an incident reporting procedure 5.3 Disaster RecoverySlide 7

Emergency Procedures Raise the alarm Make the scene safe (people first) Tackle the emergency (if it is safe for you to do so) 5.3 Disaster RecoverySlide 8

Fire Prevention and Detection Secure storage of flammable materials Fire inspections Sensor systems – Photoelectric smoke detector – Ionization smoke detector – Heat detector – Flame detector 5.3 Disaster RecoverySlide 9

Fire Suppression Class A - ordinary combustible materials Class B - flammable or combustible liquids, solids, and gases. Class C - electrical equipment Class D - combustible metals Class K - highly flammable materials 5.3 Disaster RecoverySlide 10

Extinguishers and Sprinklers Extinguisher types – Water – Dry Powder – Foam – CO2 Sprinklers – Dry pipe – Pre-action – Halon – Clean agent 5.3 Disaster RecoverySlide 11

Prioritization During Recovery Identify which business processes are critical and which are only necessary People first Consider dependencies Communications / web presence Fulfilment / transport Back office 5.3 Disaster RecoverySlide 12

Spares and Sites Redundant equipment – Disks – Servers – Sites Classification – Hot (online or near online) – Warm (might require configuration / loading with data) – Cold (resource is available but will need commissioning) Balance risk against cost 5.3 Disaster RecoverySlide 13

Replication Duplicating data between servers or sites Synchronous – data must be written to both locations before it is “committed” Asynchronous – one site receives a copy from the primary site Consider risk, distance, cost 5.3 Disaster RecoverySlide 14

Backup Strategies Scheduled file copy to media of sufficient capacity Databases and open files and 24x7 access are challenging Can backup at file, table, or record (transaction) level 5.3 Disaster RecoverySlide 15

Snapshots File systems supporting snapshots allow read-only copies of data to be taken Allows backup software to run on copy or for user to preserve file versions 5.3 Disaster RecoverySlide 16

System Backups Traditional system restore might involve repartitioning disk, reinstalling OS, then restoring data from backup Bare metal backup can be applied directly to a new drive Requires high capacity storage media 5.3 Disaster RecoverySlide 17

Archiving and Backup Types Backups are for security (copy) Archives are for material that does not require “live” access but cannot be deleted (move) Archives probably need to be backed up! Backups can use different types to tradeoff media capacity, backup time, and restore time – Mix full with incremental (changed data since last backup) – Mix full with differential (changed data since last full backup) Do not mix incremental with differential 5.3 Disaster RecoverySlide 18

Retention Policy Backups need to maintain a version of files to different points in time eg: – Data as it was in each of the last 5 days – Data as it was at the end of the last 4 weeks – Data as it was at the end of the last 12 months Storage issues – Security – Offsite copies 5.3 Disaster RecoverySlide 19

Hard Disk Backup Media Disk-to-disk backup High capacity and cheap Portable drives for SMEs SANs for enterprises (tiered storage) 5.3 Disaster RecoverySlide 20

Tape Drives QIC Travan DAT 8mm DLT Tape libraries / autoloaders Maintenance 5.3 Disaster RecoverySlide 21

Other Media WORM (CD/DVD recordable) CD / DVD Rewritable Optical jukebox Flash media 5.3 Disaster RecoverySlide 22

Media Rotation Supports retention policy and maximizes available media capacity Grandfather, Father, Son (GFS) – Daily backups (incremental or differential) reuse the son tapes each week – Weekly full backups are written to the father tapes, one for each week of the month except the last – The final weekly backup is written to the monthly grandfather tape set 5.3 Disaster RecoverySlide 23

Restoring Data and Verifying Backups Media compatibility Error detection Configuration Test restore 5.3 Disaster RecoverySlide 24

Review Develop an effective Disaster Recovery Plan (DRP) Understand the importance of fault tolerance Identify the main components that require redundancy Understand the use and configuration of clusters Understand what to do in an emergency situation and the basics of fire prevention and suppression systems Understand recovery procedures and the use of replication methods to maintain hot, cold, and warm sites Describe data and security backup and archive strategies and technologies 5.3 Disaster RecoverySlide 25

Labs Lab 15 Backup 5.3 Disaster RecoverySlide 26